CA2942521A1 - Log analysis system - Google Patents

Log analysis system Download PDF

Info

Publication number
CA2942521A1
CA2942521A1 CA2942521A CA2942521A CA2942521A1 CA 2942521 A1 CA2942521 A1 CA 2942521A1 CA 2942521 A CA2942521 A CA 2942521A CA 2942521 A CA2942521 A CA 2942521A CA 2942521 A1 CA2942521 A1 CA 2942521A1
Authority
CA
Canada
Prior art keywords
unit
analysis
processor
detection
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA2942521A
Other languages
English (en)
French (fr)
Inventor
Kazuhide Tsuchiya
Masamichi Abe
Tetsuya Kageyama
Hiroshi Kawaguchi
Hiroyuki Washio
Atsushi Umaki
Ippei Shiode
Masahiro Kimura
Hiroshi Fujimoto
Hiroshi Takechi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lac Co Ltd
Original Assignee
Lac Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lac Co Ltd filed Critical Lac Co Ltd
Publication of CA2942521A1 publication Critical patent/CA2942521A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6418Hybrid transport
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/149Network analysis or design for prediction of maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/065Generation of reports related to network devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Computer And Data Communications (AREA)
CA2942521A 2014-03-31 2015-02-26 Log analysis system Abandoned CA2942521A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2014074606A JP5640166B1 (ja) 2014-03-31 2014-03-31 ログ分析システム
JP2014-074606 2014-03-31
PCT/JP2015/055613 WO2015151667A1 (ja) 2014-03-31 2015-02-26 ログ分析システム

Publications (1)

Publication Number Publication Date
CA2942521A1 true CA2942521A1 (en) 2015-10-08

Family

ID=52145716

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2942521A Abandoned CA2942521A1 (en) 2014-03-31 2015-02-26 Log analysis system

Country Status (9)

Country Link
US (1) US10164839B2 (ja)
EP (1) EP3128457A4 (ja)
JP (1) JP5640166B1 (ja)
KR (1) KR101827197B1 (ja)
CN (1) CN106133740B (ja)
CA (1) CA2942521A1 (ja)
EA (1) EA201691642A1 (ja)
SG (1) SG11201602112WA (ja)
WO (1) WO2015151667A1 (ja)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10812327B2 (en) * 2014-07-31 2020-10-20 Ent. Services Development Corporation Lp Event clusters
JP6048555B1 (ja) * 2015-09-10 2016-12-21 日本電気株式会社 分類情報作成装置、分類情報作成方法、分類情報作成プログラム、検索装置、検索方法、及び、検索プログラム
JP6070799B1 (ja) * 2015-09-24 2017-02-01 日本電気株式会社 通信情報算出装置、通信情報算出方法、通信情報算出プログラム、及び、通信管理システム
JP5966076B1 (ja) * 2015-12-25 2016-08-10 株式会社ラック 情報処理装置、情報処理方法及びプログラム
JP6475654B2 (ja) * 2016-03-10 2019-02-27 株式会社日立製作所 情報セキュリティシステム、サーバ装置、及び情報セキュリティ支援方法
FI127335B (en) * 2016-05-27 2018-04-13 Cysec Ice Wall Oy Logging of telecommunications on a computer network
EP3291120B1 (en) * 2016-09-06 2021-04-21 Accenture Global Solutions Limited Graph database analysis for network anomaly detection systems
JP6903901B2 (ja) * 2016-11-28 2021-07-14 富士通株式会社 攻撃検知装置、攻撃検知プログラム及び攻撃検知方法
US10929765B2 (en) * 2016-12-15 2021-02-23 Nec Corporation Content-level anomaly detection for heterogeneous logs
JP7028559B2 (ja) * 2017-01-25 2022-03-02 エヌ・ティ・ティ・コミュニケーションズ株式会社 攻撃検知システム、攻撃検知方法および攻撃検知プログラム
JP6852421B2 (ja) * 2017-01-31 2021-03-31 オムロン株式会社 情報処理装置、情報処理プログラムおよび情報処理方法
CN107733716A (zh) * 2017-10-26 2018-02-23 郑州云海信息技术有限公司 分布式文件系统日志分析方法、系统、设备及存储介质
JP7006704B2 (ja) * 2017-12-13 2022-01-24 日本電気株式会社 情報処理装置、情報処理システム、情報処理方法、及び、プログラム
JP6719492B2 (ja) * 2018-02-26 2020-07-08 三菱電機株式会社 ルール生成装置およびルール生成プログラム
CN109271349A (zh) * 2018-09-29 2019-01-25 四川长虹电器股份有限公司 一种基于日志通用性规则引擎的规则处理方法
CN115668189A (zh) * 2020-06-05 2023-01-31 富士通株式会社 信息处理程序、信息处理方法和信息处理装置
CN111736579B (zh) * 2020-08-26 2020-12-08 北京安帝科技有限公司 基于日志问询留存的工业控制设备安全检测方法

Family Cites Families (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3778652B2 (ja) * 1997-04-18 2006-05-24 株式会社日立製作所 ログデータ収集管理方法及びその装置
US6597818B2 (en) * 1997-05-09 2003-07-22 Sarnoff Corporation Method and apparatus for performing geo-spatial registration of imagery
US7155507B2 (en) * 2000-03-25 2006-12-26 Nippon Telegraph And Telephone Corporation Method and system for providing environmental information on network
US7568019B1 (en) * 2002-02-15 2009-07-28 Entrust, Inc. Enterprise management system for normalization, integration and correlation of business measurements with application and infrastructure measurements
US20030188189A1 (en) * 2002-03-27 2003-10-02 Desai Anish P. Multi-level and multi-platform intrusion detection and response system
CA2496779C (en) * 2002-08-26 2011-02-15 Guardednet, Inc. Determining threat level associated with network activity
US7376969B1 (en) * 2002-12-02 2008-05-20 Arcsight, Inc. Real time monitoring and analysis of events from multiple network security devices
US7500266B1 (en) * 2002-12-03 2009-03-03 Bbn Technologies Corp. Systems and methods for detecting network intrusions
US7509677B2 (en) 2004-05-04 2009-03-24 Arcsight, Inc. Pattern discovery in a network security system
US7668809B1 (en) * 2004-12-15 2010-02-23 Kayak Software Corporation Method and apparatus for dynamic information connection search engine
US8135828B2 (en) * 2005-03-14 2012-03-13 Microsoft Corporation Cooperative diagnosis of web transaction failures
JP4523480B2 (ja) * 2005-05-12 2010-08-11 株式会社日立製作所 ログ分析システム、分析方法及びログ分析装置
US20070073519A1 (en) * 2005-05-31 2007-03-29 Long Kurt J System and Method of Fraud and Misuse Detection Using Event Logs
JP4753997B2 (ja) * 2005-09-23 2011-08-24 バークレイズ・キャピタル・インコーポレーテッド イベントログをレビューするためのシステム及び方法
US20110314148A1 (en) 2005-11-12 2011-12-22 LogRhythm Inc. Log collection, structuring and processing
KR100748246B1 (ko) * 2006-03-29 2007-08-10 한국전자통신연구원 침입탐지 로그수집 엔진과 트래픽 통계수집 엔진을 이용한다단계 통합보안 관리 시스템 및 방법
US8489110B2 (en) * 2006-05-12 2013-07-16 At&T Intellectual Property I, L.P. Privacy control of location information
US9111088B2 (en) * 2006-08-14 2015-08-18 Quantum Security, Inc. Policy-based physical security system for restricting access to computer resources and data flow through network equipment
CN101192227B (zh) * 2006-11-30 2011-05-25 阿里巴巴集团控股有限公司 一种基于分布式计算网络的日志文件分析方法和系统
JP2008205954A (ja) * 2007-02-21 2008-09-04 International Network Securitiy Inc 通信情報監査装置、方法及びプログラム
US8051204B2 (en) 2007-04-05 2011-11-01 Hitachi, Ltd. Information asset management system, log analysis server, log analysis program, and portable medium
US7844600B2 (en) * 2007-07-13 2010-11-30 Oracle International Corp. Materialized views with user-defined aggregates
JP5179792B2 (ja) * 2007-07-13 2013-04-10 株式会社日立システムズ 操作検知システム
US9390384B2 (en) * 2008-07-01 2016-07-12 The 41 St Parameter, Inc. Systems and methods of sharing information through a tagless device consortium
KR101399326B1 (ko) 2009-05-07 2014-06-03 에스케이플래닛 주식회사 정보보안을 위한 증적추적 장치 및 방법
JP5560641B2 (ja) * 2009-09-30 2014-07-30 富士通株式会社 データ管理装置、データ管理プログラムおよびデータ管理方法
US8953571B2 (en) * 2009-12-14 2015-02-10 Alwayson, Llc Electronic messaging technology
US8868728B2 (en) * 2010-03-11 2014-10-21 Accenture Global Services Limited Systems and methods for detecting and investigating insider fraud
US9020831B2 (en) * 2010-04-29 2015-04-28 Hewlett-Packard Development Company, L.P. Information tracking system and method
US9225793B2 (en) * 2011-01-28 2015-12-29 Cisco Technology, Inc. Aggregating sensor data
US20120246303A1 (en) * 2011-03-23 2012-09-27 LogRhythm Inc. Log collection, structuring and processing
US8996688B2 (en) * 2011-05-31 2015-03-31 Nokia Corporation Method and apparatus for monitoring and controlling data sharing
US20150356104A9 (en) * 2011-10-04 2015-12-10 Electro Industries/Gauge Tech Systems and methods for collecting, analyzing, billing, and reporting data from intelligent electronic devices
JP6196017B2 (ja) * 2012-01-13 2017-09-13 サターン ライセンシング エルエルシーSaturn Licensing LLC 情報処理装置及び情報処理方法、並びにコンピューター・プログラム
WO2014119669A1 (ja) * 2013-01-30 2014-08-07 日本電信電話株式会社 ログ分析装置、情報処理方法及びプログラム
WO2014138115A1 (en) * 2013-03-05 2014-09-12 Pierce Global Threat Intelligence, Inc Systems and methods for detecting and preventing cyber-threats

Also Published As

Publication number Publication date
KR20160120761A (ko) 2016-10-18
US20160197790A1 (en) 2016-07-07
KR101827197B1 (ko) 2018-02-07
WO2015151667A1 (ja) 2015-10-08
US10164839B2 (en) 2018-12-25
JP2015198301A (ja) 2015-11-09
JP5640166B1 (ja) 2014-12-10
CN106133740A (zh) 2016-11-16
CN106133740B (zh) 2019-04-05
EP3128457A1 (en) 2017-02-08
EP3128457A4 (en) 2017-11-15
SG11201602112WA (en) 2016-04-28
EA201691642A1 (ru) 2017-04-28

Similar Documents

Publication Publication Date Title
US10164839B2 (en) Log analysis system
US10104108B2 (en) Log analysis system
CN106462702B (zh) 用于在分布式计算机基础设施中获取并且分析电子取证数据的方法和系统
CN109861957A (zh) 一种移动应用私有加密协议的用户行为精细化分类方法及系统
Xiao et al. From patching delays to infection symptoms: Using risk profiles for an early discovery of vulnerabilities exploited in the wild
CN112953971A (zh) 一种网络安全流量入侵检测方法和系统
US20150172302A1 (en) Interface for analysis of malicious activity on a network
CN108763916B (zh) 业务接口安全评估方法及装置
KR20070077517A (ko) 프로파일 기반 웹 애플리케이션 침입탐지시스템 및 그 방법
CN106101061A (zh) 恶意程序的自动分类方法和装置
KR101712462B1 (ko) Ip 위험군 탐지 시스템
CN106060025A (zh) 应用程序的自动分类方法和装置
JP5927330B2 (ja) 情報分析システム、情報分析方法およびプログラム
WO2018157336A1 (zh) 数据处理装置和方法
JP6035445B2 (ja) 情報処理システム、情報処理方法およびプログラム
JP5797827B1 (ja) 情報分析システム、情報分析方法およびプログラム
CN114816895A (zh) 处理告警日志的方法、装置及存储介质
JP2015198455A (ja) 処理システム、処理装置、処理方法およびプログラム
Balcerek et al. ACARM-ng: next generation correlation framework
CN117997586B (en) Network security detection system based on data visualization
KR102646586B1 (ko) 이상패턴 감지 방법
JP2016001493A (ja) 情報分析システム、情報分析方法およびプログラム
Osuge et al. An effective feature selection scheme for android ICC-based malware detection using the gap of the appearance ratio
CN117997586A (zh) 基于数据可视化的网络安全检测系统

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20160912

FZDE Discontinued

Effective date: 20221205

FZDE Discontinued

Effective date: 20221205